System and Method For Providing Technology-Driven End-to-End Managed Security Service Products Through a Security Marketplace

a security marketplace and marketplace technology, applied in the field of cybersecurity marketplace, can solve the problems of customer employees who sign up for non-standard services and use web tools, inadvertent disclosure of sensitive business information and intellectual property, etc., and achieve the effect of improving customer security posture, effective and seamless improvement of customer experien

Inactive Publication Date: 2016-07-14
LEIDOS
View PDF4 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such threats arise, for example, from customer employees who sign up for non-standard services and use web tools outside the enterprise information technology structure.
Such events often result in the inadvertent disclosure of sensitive business information and intellectual property.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and Method For Providing Technology-Driven End-to-End Managed Security Service Products Through a Security Marketplace
  • System and Method For Providing Technology-Driven End-to-End Managed Security Service Products Through a Security Marketplace
  • System and Method For Providing Technology-Driven End-to-End Managed Security Service Products Through a Security Marketplace

Examples

Experimental program
Comparison scheme
Effect test

first embodiment

[0011]In a first embodiment, a system for the automated provisioning and tracking of cloud-implemented security products for protecting an entity's digital assets includes: a first application programming interface for receiving security product data from one or more security product vendors and storing the security product data in a relational database; a second application programming interface for receiving entity data and storing the entity data in the relational database, wherein the entity data is associated with one or more digital assets of the entity and further wherein the digital assets are accessible through the entity's virtual private cloud; a processing engine for comparing the received entity data with the received security product data and providing at least one recommendation to the entity for a security product from the one or more security product vendors to protect one or more digital assets of the entity; a provisioning component for receiving instructions from...

second embodiment

[0012]In a second embodiment, a method for facilitating the automated provisioning and tracking of cloud-implemented security products for protecting an entity's digital assets includes: receiving via a first application programming interface security product data from one or more security product vendors and storing the security product data in a relational database; receiving via a second application programming interface entity data and storing the entity data in the relational database, wherein the entity data is associated with one or more digital assets of the entity and further wherein the digital assets are accessible through the entity's virtual private cloud; comparing by a processing engine the received entity data with the received security product data; providing to the entity via the first application programming interface at least one recommendation for a security product from the one or more security product vendors to protect one or more digital assets of the entity...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A platform provides customers with complete and compelling consumption-based service while using the information it gathers to improve the customer's experience. This capability includes cloud integration to monitor the customer's cloud workload which is then used to identify risks and make recommendations on how to mitigate those risks through the management of the customer's security infrastructure. The platform relies upon third party security products from independent security vendors to provide the technology that forms the platform's security portfolio. Through the platform's web-based vendor portal, each vendor maintains its own product information including features sets, target customer demographics, applicable software stacks, compliance / regulatory capabilities and pricing. By cross referencing this product information with specific customer information, the platform can intelligently promote the correct products and capability upgrades at the right time to the right customers.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]The present application claims the benefit of priority to similarly titled U.S. Provisional Patent Application 62 / 013,147 filed Jan. 14, 2015, the entirety of which is incorporated herein by reference.BACKGROUND[0002]1. Field of the Embodiments[0003]The present embodiments are generally directed to enterprise network and asset security. More particularly, the embodiments describe a cybersecurity marketplace.[0004]2. Description of Related Art[0005]As businesses adopt the ideas behind cloud computing, i.e., virtualization, pay-per-use pricing and rapid provisioning, there is a need for an accompanying platform to handle the marketing, sales, pre-sales requirements gathering, fulfillment, management and operations of the security solutions that accompany those business applications, including monitoring and matching of vendor solutions with customer needs in an efficient, secure manner.[0006]There is a need for a platform that provides a fu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/57G06Q30/00G06Q30/06H04L29/06
CPCG06F21/577H04L63/04H04L63/0272G06F2221/034G06Q30/0631H04L63/1433G06Q30/0185G06F21/604H04L63/20G06F16/904
Inventor COEN, MICHAELFORMICA, ANDREWJOHNSON, ERICLAWRENCE, JOHNZANGARI, JOSHUAZEMERICK, JEFFREY
Owner LEIDOS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products